Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks

Identification schemes support that a prover who holding a secret key to prove itself to any verifier who holding the corresponding public key. In traditional identity-based identification schemes, there is a key generation center to generate all users’ secret keys. This means that the key generatio...

Full description

Bibliographic Details
Main Authors: Fei Tang, Jiali Bao, Yonghong Huang, Dong Huang, Fuqun Wang
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/8820271